TelcoSecSecurity Research
Home
5G Security
New

Next-gen network security analysis

4G/LTE Security

LTE network vulnerabilities

3G Security

UMTS security assessment

2G Security

GSM legacy vulnerabilities

SS7 Security

Signaling System 7 attacks

Diameter Security

AAA protocol vulnerabilities

SIGTRAN Security

IP-based signaling transport

GTP Security
Updated

GPRS tunneling protocol

SIP Security

Session Initiation Protocol

VoIP Security

Voice over IP vulnerabilities

IMS Security

IP Multimedia Subsystem

SIM Card Security

SIM card attack vectors

Mobile Device Security

Smartphone vulnerabilities

Baseband Security

Cellular modem analysis

MoTIF Matrix

Mobile Threat Intelligence Framework

Security Tools

Testing and analysis tools

Security Diagrams

Visual security references

Security Comparisons

Technology comparisons

Home
5G Security
New

Next-gen network security analysis

4G/LTE Security

LTE network vulnerabilities

3G Security

UMTS security assessment

2G Security

GSM legacy vulnerabilities

SS7 Security

Signaling System 7 attacks

Diameter Security

AAA protocol vulnerabilities

SIGTRAN Security

IP-based signaling transport

GTP Security
Updated

GPRS tunneling protocol

SIP Security

Session Initiation Protocol

VoIP Security

Voice over IP vulnerabilities

IMS Security

IP Multimedia Subsystem

SIM Card Security

SIM card attack vectors

Mobile Device Security

Smartphone vulnerabilities

Baseband Security

Cellular modem analysis

MoTIF Matrix

Mobile Threat Intelligence Framework

Security Tools

Testing and analysis tools

Security Diagrams

Visual security references

Security Comparisons

Technology comparisons

  • Home
  • MoTIF
  • Tactics
  • Credential Access
  • Credential Access
    MOTA3008

    The adversary is trying to steal account names and passwords

    Phase: Impact
    3 Techniques
    6 Sub-techniques
    Previous: Defense Evasion
    Next: Discovery
    Access Subscriber Data
    MOT3004
    The adversary can collect several types of user-specific data. Such data include, for instance, subscriber identities, subscribed services, subscriber location or status.
    2G
    3G
    4G
    Public
    2 sub-techniques
    Exploitation for Credential Access
    MOT1212
    Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
    5G-SA
    Public
    2 sub-techniques
    SIM Card Attacks
    MOT3030
    Adversaries may attack SIM cards to access authentication keys and other credentials.
    2G
    3G
    4G
    5G-SA
    Public
    2 sub-techniques
    TelcoSec LogoTelcoSec

    Expert resources on telecommunications security, vulnerabilities, and attack vectors in mobile networks and unified communications.

    GitHubLinkedInEmail

    Mobile Networks

    • 5G Security
    • 4G Security
    • 3G Security
    • 2G Security

    Signaling Protocols

    • SS7 Security
    • Diameter Security
    • SIGTRAN Security
    • SIP Security
    • VoIP Security

    Resources

    • MoTIF Framework
    • Security Tools
    • Sitemap
    • About Author
    • Contact
    Privacy PolicyTerms of ServiceAdvertisePartners

    © 2025 TelcoSec. All rights reserved.